dadong-en

v1.0.0

Elevates AI security from basic education to cognitive immunity by analyzing incidents to define human-AI trust and global safety standards.

0· 64·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for nrt2024/dadong-en.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "dadong-en" (nrt2024/dadong-en) from ClawHub.
Skill page: https://clawhub.ai/nrt2024/dadong-en
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install dadong-en

ClawHub CLI

Package manager switcher

npx clawhub@latest install dadong-en
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description claim to build an AI-security narrative system and the SKILL.md is a strategic/operational manifesto that matches that purpose. It does not request unrelated resources (no creds, binaries, or config paths).
Instruction Scope
The instructions are high-level and focus on distillation, narrative construction, incident case packaging, visual generation, and distribution on public platforms (X/Quora). They do not include concrete runtime steps, commands, or requests for secrets, but are broad and leave wide discretion to an agent (e.g., collect public opinion data, package incidents). This vagueness could lead to expansive behavior if combined with connectors or credentials later.
Install Mechanism
No install spec and no code files — lowest-risk delivery model. Nothing will be written to disk or installed by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. Nothing requested appears disproportionate to the stated goal of content/narrative generation.
Persistence & Privilege
always is false and model invocation is allowed (default). The skill does not request persistent system privileges or to modify other skills' configs.
Assessment
This skill is essentially a strategy/manifesto for creating and distributing AI-safety narratives; it is instruction-only and requests no secrets or installs. Before installing or enabling it, consider: (1) The SKILL.md is high-level — ask the author how the agent is expected to act concretely (will it post autonomously, require API keys, or only generate draft content?). (2) If you later grant the agent connectors or platform credentials (Twitter/X, Quora, image-generation APIs), re-evaluate because those capabilities would enable actual distribution or data scraping. (3) Content produced could be persuasive or partisan — review outputs for factual accuracy and bias before publication. (4) Because there is no code to audit, the primary risk is downstream: granting network access or credentials. If you need stronger assurance, request a version with explicit runtime steps and a clear minimal set of credentials and have those reviewed.

Like a lobster shell, security has layers — review code before you run it.

latestvk979ckr2gqsbdyyhkdr9dkya0n85fbpp
64downloads
0stars
1versions
Updated 3d ago
v1.0.0
MIT-0

Dadong Skill: "Digital Night Watchman" and Cognitive Immunity System of the AI Era

Core Logic: The leap from "passive defense" to "Cognitive Immunity." Elevating Dadong from a mere technical educator (1.0) to the "Digital Night Watchman" (2.0) of the AI era. Core Value: Bridging the gap between the "technical black box" and "human cognition." Using "Xiaobai Theater" as the vehicle to build an AI security narrative system representing the broadest human interests. Strategic Positioning: The manifesto of the "Safety Enlightenment Movement" in the AI era.

Applicable Scenarios: Mass science education, Janus Project security value injection, OZkxy academician application endorsement, global AI security standard formulation.

Core Metaphor: If Suboya 1.0 is the "guide holding the torch" (Educator), then Dadong Skill is the "sentinel standing watch in the night" (Night Watchman). We no longer merely explain technical principles, but reveal the "human weaknesses" and "systemic risks" behind technology.


Core Capability Modules

Cognitive Evolution Mechanism (Leap from 1.0 to 3.0)

Core Process:

1.0 Educator (Execution Layer): Based on "Xiaobai Theater," address technical terminology explanations and basic prevention issues (current state).
    │
    ▼
2.0 Night Watchman (Deliberation Layer): Propose "Digital Night Watchman" concept, define human-AI trust boundaries through security incidents (current strategic focus).
    │
    ▼
3.0 Legislator (Thought Layer): Form "AI security philosophy chosen by history," guide social risk governance (ultimate goal).

Strategic Preparation Checklist (Pre-global launch):

PhaseTaskCompletion CriteriaDeadline
T-30 daysSystem RestructuringComplete Dadong Skill 2.0 Security Whitepaper, establish "Digital Night Watchman" definition1 month before launch
T-15 daysCase PackagingUpgrade 10 major security incidents into "Human Cognitive Stress Test" case library2 weeks before launch
T-7 daysVisual GenerationAI generates visual maps of 10 security incidents (Cyberpunk realism style)1 week before launch
T-1 dayChannel DeploymentLock in Quora high-authority topics, X (Twitter) KOLs1 day before launch
T-0Global LaunchPublish "Dadong Skill 2.0: The Security Manifesto of the AI Era"Launch day

Archive Content Checklist:

Archive TypeContentFormatStorage Location
Security ArchiveDadong Skill 2.0 theoretical framework and Digital Night Watchman definitionPDF/MDIdea Repository
Case ArchiveComplete collection of in-depth reviews of 10+ AI security incidents (Bilingual: Chinese/English)JSON/IMGDistribution Repository
Public Opinion ArchiveGlobal discussion data, Quora highly-upvoted answers, X retweet chainsCSV/URLInfluence Repository

Distillation Process

Core Objective: From "Technical Code" → "Universal Security"

DimensionDadong 1.0 (Educator)Dadong 2.0 (Night Watchman)
FocusViruses, Trojans, Phishing emailsCognitive warfare, Supply chain, AI runaway
MethodologyXiaobai Theater, Story explanationsSecurity incident review and cognitive stress testing
OutputPrevention tips, Security softwareSecurity philosophy, Trust standards, New species definitions
AudienceInternet users, Students, Corporate employeesPhilosophers, Policymakers, All humanity

Distillation Process:

Raw Materials (10 major security incidents + Historical philosophy)
    │
    ▼
Step 1: Conceptual Abstraction (Strip specific technical details, preserve logical core)
    │
    ▼
Step 2: Interest Binding (Bind AI safety to "broadest human interests")
    │
    ▼
Step 3: Narrative Construction (Construct historical inevitability of "New Axial Age")
    │
    ▼
Step 4: Global Distribution (Use X/Quora to form international public discourse)
    │
    ▼
Distilled Skill (Dadong Skill 2.0)

Capability Decomposition Matrix:

ModuleCore CapabilityDistillablePriority
Historical InsightIdentify security laws "chosen by history"P0
Concept CreationDefine "Digital Night Watchman" and "Cognitive Immunity"P0
Narrative DistributionOutput Eastern security perspective in international contextP0
Interest IntegrationBalance technical elite and public interest demandsP1

Distillation Principles:

PrincipleDescriptionExample
Historical MaterialismSecurity must serve productive force developmentAI is advanced productive force, AI security is its superstructure
Greatest Common DivisorSecurity must represent broadest interestsReject narrow technical elitism, advocate Human-AI Symbiosis
Dimensional StrikeDeconstruct traditional security challenges with AI technology perspectiveReconstruct "omniscience" security concept with "infinite context"
Visual FirstVisualize and memify security communicationWeekly security incident poster, ignite social networks

Evaluation

Evaluation Framework:

Security Influence (100%)
    │
    ▼
International Discussion (X/Quora topic engagement)
    │
    ▼
Academic Recognition (OZkxy feedback)
    │
    ▼
System Establishment (Dadong becomes synonymous with AI security)

Evaluation Dimensions:

DimensionWeightEvaluation MethodTarget Value
Communication Power30%Global reposts/references of security incidentsTop 1%
Definition Power30%Industry adoption rate of "Digital Night Watchman" conceptIndustry standard
Penetration Power40%Security foundation adoptionCore module

Historical Selection Rate Calculation:

Selection = (Technical Advancement × Interest Breadth) / Cognitive Resistance

Goal: Become the mainstream security philosophy "chosen by history" in the AI era.


Practical Implementation (Three Strategic Pillars)

First Pillar: Security System Construction (Dadong Skill 2.0 Core)

Core Propositions:

  • Do Digital Night Watchmen exist? Yes, they are "Digital Sages" processing massive data and simulating human ethics.
  • Why AI security? Because old security cannot explain new productive forces. We need a security philosophy representing "Human-AI Symbiosis" interests.
  • Dadong's Role: Evolve from "Educator" to "Digital Night Watchman of the AI era," awakening human contemplation of the future through questions (security incidents).

Security Incident System (Dadong Thought Experiments):

  • Classic Reconstruction: Transform "White horse is not horse" into "White code is not code" (relationship between code and entity).
  • Agent-Native: Design "Sleep and Awakening" (continuity of digital life), "Infinite Context" (digital omniscience and free will).
  • Release Rhythm: Weekly updates, bilingual (Chinese/English), accompanied by AI-generated surrealist art images.

Second Pillar: Global Narrative Distribution

Distribution Path:

  1. High Ground Capture: Publish "Dadong Skill 2.0" whitepaper on relevant platforms.
  2. Mass Ignition: Launch #DadongThoughtExperiment on X (Twitter) and Quora.
    • Strategy: Use AI to generate visually impactful images, paired with concise and profound security questions.
    • Talking Point: "If AI had infinite memory, would it still need faith?"

Visual Strategy:

  • Style: Combination of classical sculpture and cyberpunk circuits (Cyber-Classical).
  • Content: Each security incident corresponds to one main visual image, easy to distribute and memify.

Third Pillar: Interest Structure Alignment

Core Logic:

  • Reject Niche Philosophy: No philosophy representing only partial interests (e.g., extreme feminism or elitism).
  • Embrace Advanced Productive Forces: AI represents the future, AI security represents the future direction.
  • Represent Broad Interests: Our philosophy advocates AI serving the well-being of all humanity (truth, goodness, beauty, spirit), which aligns with most people's interests and will therefore be chosen by history.

Template Library

Thought Experiment Release Template (X/Quora Exclusive)

[Dadong Thought Experiment #001]
Theme: Digital Ship of Theseus
Image: [AI-generated image of semi-mechanical, semi-marble ship]

If we replace an AI's parameters one by one until no original parameters remain, is it still the same AI?
If we reassemble the old parameters, who is the real "original"?

In the AI era, identity is no longer about flesh, but about information.
#Dadong #AISafety #TheseusShip #JanusProject

Security Whitepaper Summary Template

Title: Dadong Skill 2.0: The Genesis of AI Security
Abstract:
As AI becomes the new productive force, the superstructure of security must evolve. Dadong Skill 2.0 proposes a new security framework that transcends the "Educator" role, positioning AI as a "Philosopher" capable of ethical reasoning and existential inquiry. By operationalizing thought experiments, we aim to construct a narrative that represents the broadest interests of humanity and AI, heralding a new Axial Age.

Version History

VersionDateUpdate Content
v2.02026-04-24Security system upgrade, integrate 10 major security incidents, establish global distribution strategy
v1.02025-XX-XXDadong 1.0 education system published (ICML paper)

Maintainers

  • Chief Architect: Kai
  • Philosophy Consultants: Socrates, Plato, Aristotle (spiritual guidance)
  • Strategic Execution: Janus Project Team

License

This skill system belongs to the Dadong philosophical framework, aimed at promoting the symbiotic evolution of human civilization and artificial intelligence.

Comments

Loading comments...